VeilidGROWL

For discussions about programming, and for programming questions and advice


Moderator: Forum moderators

Post Reply
lobster
Posts: 5
Joined: Tue Jul 14, 2020 9:11 am
Been thanked: 1 time

VeilidGROWL

Post by lobster »

:welcome: There I was (and this is a true story) pondering how to kill two fish with one stick :mrgreen:
... and therefore Puppy has a new test version of the very simple to understand GROWL security program.

You will notice
it is being renamed Veilid Growl - Veilid is the second fish
Have also added a menu for the Fediverse (Including Mastodon which you may have heard of)
https://veilid.com/ - Once it gets to version Veilid Growl 1.0 (currently at 0.6) I might release it on the fediverse ... this is the RC - release candidate pretty rough ... I should call it a beta but hey ho!

Veilid that is a another story ...

I have included all my notes for Growl :welcome:

To run it:

  • Pet your Puppy (if availble)
    Save the enclosed code into a text file called 'VeilidGrowl0.6.sh'
    Change the permissions of the file to executible
    Click in ROX or filemanager on VeilidGrowl0.6.sh and it should open a terminal and run on most Puppys

    Any modifications or not working, let me know in this thread

Code: Select all

#! /bin/bash 
 # 
 # Veilid Growl v0.6 Give Receive Open Welcome Learn
 # Puppy GROWL v2.5RC Guard! Restrict! Observe! Watch! Lookout!
 # developed on Puppy 8 (BionicPup 64bit) and then FossaPup64 version 9.6 (released Mar 2023)
 #
 # Thu 12 Oct 15:06:41 BST 2023


 # GROWL name changed to 'VeilidGROWL'
 # added Veilid Menu
 # added Firefox and PrivacyBadger options
 # removed redundant programs and updated links
 # updated: Help with GtkDialog tutorial, Old Puppy GROWL info
 # updated and moved code to new forum link 
 # 2 new high quality search engines added under Services
 #    SearXNG and Whoogle
 # changed to urxvt terminal from rxvt
 # removed bycrypt not in default Fossapup64
 #
 # <menuitem> 
 #<label>Encrypt a File: bycrypt (Puppy)</label> 
 #<action>bcrypt_gui &</action> 
 #</menuitem> 
 
 # seems to have gone ... not sure what it was anyway
 #<menuitem>          
 #<label>Crpt Secure email</label> 
 #<action>defaultbrowser https://crpt.info &</action> 
 #</menuitem>
 
 # removed this centralised potential selling of passwords
 #<menuitem> 
 #<label>LastPass Password Manager</label> 
 #<action>`Xdialog --wrap --screencenter --left --title "install LastPass" --msgbox "Install Encrypted Password Manager. \n As super user SPOT" 600x0`</action> 
 #<action>urxvt -e su spike &</action>          
 #<action>urxvt -e defaultbrowser https://addons.mozilla.org/en-US/seamonkey/addon/lastpass-password-manager/ &</action> 
 #<action>exit</action> 
 #</menuitem> 

   ####  Notes for Menuing
 ##

 
 ## Grrr=Growl Menu 
 ##    rxvt=terminal/console/commandline
 ##    su /spot is a Puppy Super User
 ##
  
 ##add somewhere
 ##Lots of codes.
##https://techdator.net/iphone-secret-codes/
##https://joyofandroid.com/android-secret-codes-hidden-menu-dialler-codes/
##https://www.youtube.com/watch?v=6iaR3WO71j4      
 
#### End of 0.5 notes 


## ###### add this stuff
 
 # previously on Puppy
 # GROWL v2.5 rc - Sat pm April 20 019 - tested on Puppy 8 (BionicPup 64bit) 
 # Security enhancements, probes, online services and info for Puppy Linux 
 # thanks to SFR, Shadow, Linux Kodachi, Liberte Linux, Buddha Vajrasattva and our Puppy yap dogs (security paranoids) 

 # New notes for 2.4 
 # lsof -i not working from probe menu probably because of previous gtkdialog error - works directly from command line 
 # tor install this action removed but useful link <action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=947972#947972 &</action> 
 # edit source code moved to security menu 
 # Crpt Secure email added 
 # Ipleak moved to probes 
 # ecosia search engine added 
 # changed media player and browser to defaultmediaplayer defaultbrowser 
 # added https://www.schneier.com/ link under help 
 # unconventional NSA Hacking info added 
 # added youtube and open security links 

 # improves + notes August 2021 for fatdog
 # <action>rxvt -e defaultbrowser -safe-mode &</action> 
 # <action>su spike -c defaultbrowser -safe-mode &</action>
 
 # <menuitem> 
 # <label>Run Browser securely</label> 
 # <action>`Xdialog --wrap --screencenter --left --title "Run browser securely" --msgbox "Default browser will look plain whilst running securely. \n as super user SPOT" 600x0`</action> 
 # <action>rxvt -e defaultbrowser -safe-mode &</action>
 # </menuitem> 

##https://techdator.net/iphone-secret-codes/
##https://joyofandroid.com/android-secret-codes-hidden-menu-dialler-codes/
##https://www.youtube.com/watch?v=6iaR3WO71j4  

 #### Code begins here 
 #### SFR Password Generator 
 PASSGEN () 
 { 
    # Generates a password with at least: 
    # - 1 lowercase letter 
    # - 1 uppercase letter 
    # - 1 digit 
    # - 1 punctuation mark 
     
    TITLE="PassGen" 
     
    # Min: 8, Max:256, Default: 16 
    LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "") 
    [ $? -ne 0 ] && exit 
     
    [ ${LENGTH} -lt 4 ] && LENGTH=4   # must be at least 4, or else the loop below will never end 
     
    while true; do 
       while true; do 
          PASS="$(tr -cd '[[:alnum:]][[:punct:]]' < /dev/urandom 2>/dev/null | head -c ${LENGTH})" 
          if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then 
             break   # all criteria were met, so break the loop 
          fi 
       done 
       
       echo "${PASS}" | Xdialog --title "${TITLE}" --ok-label="Repeat" --cancel-label="Close" --textbox - 0 0 
       [ $? -ne 0 ] && break 
    done 
 } 

 export -f PASSGEN
  
  
  
 #### Code begins here 
 #### SFR Password Generator 2 
     
    ## Min: 8, Max:256, Default: 16 
    #LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "") 
    #[ $? -ne 0 ] && exit 
     
    #[ ${LENGTH} -lt 4 ] && LENGTH=4   # must be at least 4, or else the loop below will never end 
     
    #while true; do 
       #while true; do 
          #PASS="$(tr -cd '[[:alnum:]][[:punct:]]' < /dev/urandom 2>/dev/null | head -c ${LENGTH})" 
          #if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then 
             #break   # all criteria were met, so break the loop 
          #fi 
       #done 
      #PASSGEN2 () 
 #{ 
    ## Generates a password with at least: 
    ## - 1 lowercase letter 
    ## - 1 uppercase letter 
    ## - 1 digit 
    ## - 1 punctuation mark 
    
  #while true; do 
    #Min: 8, Max:256, Default: 16 
    #LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "") 
    #[ $? -ne 0 ] && exit 
     #TITLE="PassGen2"   
       #echo "${PASS}" | Xdialog --title "${TITLE}" --ok-label="Repeat" --cancel-label="Close" --textbox - 0 0 
       #[ $? -ne 0 ] && break
   #fi 
    #done 
 #} 

 #export -f PASSGEN2 

 #### End of Password Generator2 code 


 
 #### Program 'Grrr' using GtkDialogue begins below

 export Grrr=' 
 <window title="Veilid GROWL v0.5" window-position="1"> 
 <vbox> 
 <menubar> 
 <menu> 
 
 <menuitem> 
 <label>Quick DISCONNECT eth0</label>      
 <action>ifconfig eth0 down &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Connect eth0</label> 
 <action>ifconfig eth0 up &</action> 
 </menuitem>  
 
 <menuitem> 
 <label>Password Generator</label> 
 <action>PASSGEN &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Password Generator2</label> 
 <action>PASSGEN2 &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Veilid</label> 
 <action>defaultbrowser https://veilid.com/ &</action> 
 </menuitem>  

 <menuitem> 
 <label>Install Firefox</label> 
 <action>`Xdialog --wrap --screencenter --left --title "Firefox Browser" --msgbox "Install Firefox\nfrom Quickpet/Browsers\n\nFirefox is not Chrome/Google controlled" 600x0`</action> 
 <action>defaultbrowser https://wiki.debian.org/Firefox &</action>
 </menuitem> 
    
 <menuitem> 
  <label>Install PrivacyBadger</label> 
 <action>`Xdialog --wrap --screencenter --left --title "PrivacyBadger for firefox" --msgbox "Install PrivacyBadger\nfrom Quickpet/Browsers\n\nPrivacyBadger blocks trackers " 600x0`</action> 
  <action>defaultbrowser  https://packages.debian.org/buster/webext-privacy-badger &</action>
 </menuitem> 

<menuitem> 
<label>Photonmail</label> 
<action>defaultbrowser https://protonmail.com/ &</action> 
</menuitem>
 
  <menuitem> 
<label>Signal</label> 
<action>defaultbrowser https://signal.com/ &</action> 
</menuitem>
    
<menuitem> 
 <label>Install Tor Browser</label> 
 <action>`Xdialog --wrap --screencenter --left --title "Tor Browser" --msgbox "Install Tor\nfrom Quickpet/Browsers\n\nTor was originally developed by the CIA" 600x0`</action> 
 <action>quickpet &</action> 
</menuitem> 
 
<menuitem> 
 <label>Browser Paranoid Kit</label>  
 <action>`Xdialog --wrap --screencenter --left --title "install Paranoid Kit" --msgbox "Install Paranoid Kit. \n As super user spike" 600x0`</action> 
 <action>urxvt -e  su spike &</action>          
 <action>urxvt -e  defaultbrowser https://addons.mozilla.org/en-GB/firefox/collections/theparadox/paranoia/ &</action> 
 <action>exit</action> 
</menuitem>    
   
 <menuitem> 
 <label>Run Browser Privately</label> 
 <action>`Xdialog --wrap --screencenter --left --title "Run browser privately" --msgbox "Default browser runs privately \n not saving sites visited" 600x0`</action> 
 <action>rxvt -e defaultbrowser -privately &</action>
 </menuitem> 
 
 <menuitem> 
 <label>Enhanced Lock Screen (Puppy) </label> 
 <action>rm -f /root/.xlockrc</action> 
 <action>xmodmap -e "keycode 37="</action> 
 <action>xmodmap -e "keycode 109="</action> 
 <action>rxvt -e /usr/local/apps/Xlock/AppRun &</action> 
 <action>`Xdialog --wrap --screencenter --left --title "reactivating ctrl keys" --msgbox "reactivating ctrl keys. \n deactivated whilst using lockscreen" 600x0`</action> 
 <action>xmodmap -e "keycode 37=Control_L"</action> 
 <action>xmodmap -e "keycode 109=Control_R"</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Remove Flash cookies from Puppy</label> 
 <action>rm -rf /root/.macromedia</action> 
 <action>rm -rf /intrd/pup_rw/root/.macromedia/</action> 
 <action>`Xdialog --wrap --screencenter --left --title "Remove Flash cookies" --msgbox "Macromedia flash cookies removed" 600x0`</action>        
 </menuitem> 
 
 <menuitem> 
 <label>Edit source code</label> 
 <action>geany VeilidGrowl0.5RC.sh &</action> 
 </menuitem> 

 <menuitem stock="gtk-quit"> 
 <action>echo You selected the quit menu item</action> 
 <action type="exit">exit by menu</action> 
 </menuitem> 
 
 <label>Veilid</label> 
 </menu> 
 
 <menu> 
 
 <menuitem> 
<label>Fedi.social</label> 
<action>defaultbrowser https://fedia.social/ &</action> 
</menuitem>
 
 <menuitem>
 <label>Firefish.social</label> 
<action>defaultbrowser https://firefish.social/ &</action> 
</menuitem>
  
  <menuitem>
 <label>infosec.town</label> 
<action>defaultbrowser https://infosec.town/ &</action> 
</menuitem>
  
  <label>Federation</label> 
 </menu> 
 
 <menu>        
 
 <menuitem> 
 <label>Htop process viewer</label>      
 <action>rxvt -e htop &</action> 
 </menuitem> 

 <menuitem> 
 <label>Cover Your Tracks (EFF)</label>      
 <action>defaultbrowser https://coveryourtracks.eff.org/ &</action> 
 </menuitem> 

 <menuitem> 
 <label>Ipinfodb</label> 
 <action>defaultbrowser ipinfodb.com &</action>              
 </menuitem> 

 <menuitem>          
 <label>Webkay</label> 
 <action>defaultbrowser webkay.robinlinus.com &</action> 
 </menuitem> 

 <menuitem> 
 <label>Shields Up</label> 
 <action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action> 
 </menuitem> 

 <menuitem> 
 <label>DNS leak test</label> 
 <action>defaultbrowser https://www.dnsleaktest.com &</action> 
 </menuitem>        

 <menuitem> 
 <label>Ipleak</label> 
 <action>defaultbrowser https://ipleak.net/ &</action> 
 </menuitem> 

 <label>Probes</label> 
 </menu>  

 <menu>  



<menuitem>   
  <label>Run IRC Chat securely (Puppy) </label> 
 <action>`Xdialog --wrap --screencenter --left --title "Run IRC securely" --msgbox "Puppy is on freenode server. \n in #puppylinux Network super user SPOT" 600x0`</action> 
 <action>su spot -c defaultchat &</action> 
 </menuitem> 

 <menuitem> 
 <label>Ecosia Search</label> 
 <action>defaultbrowser https://www.ecosia.org/ &</action> 
 </menuitem> 
 
<menuitem> 
 <label>SearXNG Search</label> 
 <action>defaultbrowser https://search.bus-hit.me/ &</action> 
</menuitem> 
 
<menuitem> 
 <label>Whoogle Search</label> 
 <action>defaultbrowser https://whoogle.io/ &</action> 
</menuitem> 
 
 <menuitem>          
 <label>Anonymouse proxy</label> 
 <action>defaultbrowser anonymouse.org &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Vpnbook proxy</label> 
 <action>defaultbrowser http://www.vpnbook.com/webproxy &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>HideMe Proxy</label> 
 <action>defaultbrowser https://hide.me/en/proxy &</action> 
 </menuitem>      
 
 <label>Services</label> 
 </menu> 
 
 <menu>      

 <menuitem> 
 <label>Puppy Forum</label> 
 <action>defaultbrowser https://forum.puppylinux.com/ &</action> 
 </menuitem>

<menuitem>          
 <label>Puppy Security Discussions</label> 
 <action>defaultbrowser https://forum.puppylinux.com/viewforum.php?f=54&sid=0117b05c957192cf95d1c149eacbcc85 &</action> 
</menuitem>    
 
 <menuitem>          
 <label>About Flash Cookies</label> 
 <action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Browser Security Add Ons</label> 
 <action>defaultbrowser https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Spot, Fido, root</label> 
 <action>defaultbrowser file:///usr/share/doc/root.htm &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Honeynet Open Security info</label> 
 <action>defaultbrowser http://www.honeynet.org/about &</action> 
 </menuitem> 


 <menuitem> 
 <label>Surveillance Self-Defense (EFF)</label> 
 <action>defaultbrowser  https://ssd.eff.org/ &</action> 
 </menuitem>  
 
 <menuitem> 
 <label>CIA Hacking info</label> 
 <action>defaultbrowser https://wikileaks.org/ciav7p1/cms/index.html &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Unconventional Security info</label> 
 <action>defaultbrowser https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>NCSC UK security guidance</label> 
 <action>defaultbrowser https://www.ncsc.gov.uk/guidance &</action> 
 </menuitem>  
 
 <menuitem> 
 <label>EUFI Secure boot</label> 
 <action>defaultbrowser http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot &</action> 
 </menuitem>  
 
  <menuitem> 
 <label>GtkDialog tutorial</label> 
 <action>defaultbrowser https://wikka.puppylinux.com/gtkdialog &</action> 
 </menuitem> 
 
  <menuitem> 
 <label>GROWL info</label> 
 <action>defaultbrowser https://wikka.puppylinux.com/Lobster &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Build a tin hat</label> 
 <action>defaultbrowser http://zapatopi.net/afdb/ &</action> 
 </menuitem> 
 
 <menuitem> 
 <label>FAQ</label> 
 <action>`Xdialog --wrap --screencenter --left --title "FAQ" --msgbox "Lock screen - security protection level = low, suitable for young children, colleagues at work and Window users \n Load firewall - security protection level = high \n Run as spot, run browser as spot, run Puppy browser as spot - security protection level = high \n Encrypt a file bycrypt - security protection level = high \n Tip: Restart x server - flushes memory \n Tip: Use Encrypt save file if saving \n Tip: Install latest Firefox browser (does not use Google Data Servers)" 600x0`</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Credits</label> 
 <action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "VeilidGrowl v 0.5\nOctober 023\nUpdated by Lobster. Password Generator Code by SFR" 600x0`</action> 
 </menuitem> 
 
 <menuitem> 
 <label>Final thoughts ...</label> 
 <action>defaultmediaplayer −novideo /root/puppy-reference/audio/goodluck.m4a &</action> 
 </menuitem> 
 
 <label>Help</label> 
 </menu>  
 
 </menubar> 
 <frame> 
 <pixmap> 
 <input file>/usr/share/midi-icons/lock-screen48.png</input> 
 </pixmap> 
 <text><label>VeilidGROWL 0.6</label></text> 
 <text><label>based on FossaPup64 GROWL 2.5</label></text> 
 </frame> 
 <hbox> 
 <button help> 
 <action>`Xdialog --wrap --screencenter --left --title "'$(gettext 'GROWL - Quick Start Help')'" --msgbox "'$(gettext 'VeilidGROWL v0.6 is a simple, open, configurable, Security Tool. \n\n Written in bashscript using the GtkDialog4 container and Puppy Linux, Geany text environment.\n\n VeilidGROWL is used for enhancing security, education, online services and probing ones set up.\n\n Lobster Mon  9 Oct 07:19:35 BST 2023')'" 600x0`</action> 
 </button> 
 <button cancel></button> 
 </hbox> 
 </vbox> 
 </window>' 

 gtkdialog4 --program Grrr 
 unset Grrr

Last edited by lobster on Fri Oct 13, 2023 8:16 am, edited 3 times in total.
lobster
Posts: 5
Joined: Tue Jul 14, 2020 9:11 am
Been thanked: 1 time

Re: GROWL 2.5rc

Post by lobster »

Veilid Growl is up to 0.6 :mrgreen:

New links such as
https://infosec.town/ where you wll find me wandering around pretending I have a clue :mrgreen:
https://coveryourtracks.eff.org/ from the Electronic Frontier Foundation

lobster
Posts: 5
Joined: Tue Jul 14, 2020 9:11 am
Been thanked: 1 time

Re: GROWL 2.5rc

Post by lobster »

OK updated to new code in first post in this thread.

Wondering if Puppy still has an IRC channel - the one I have on Freenode not working ...

Tahrbaby
Posts: 117
Joined: Mon Jul 13, 2020 8:26 am
Location: Tenerife
Has thanked: 40 times
Been thanked: 17 times

Re: GROWL 2.5rc

Post by Tahrbaby »

lobster wrote: Fri Oct 13, 2023 8:09 am

OK updated to new code in first post in this thread.

Wondering if Puppy still has an IRC channel - the one I have on Freenode not working ...

@lobster
Yes,you can find it here now, Libera.Chat is the IRC network.

lobster
Posts: 5
Joined: Tue Jul 14, 2020 9:11 am
Been thanked: 1 time

Re: VeilidGROWL

Post by lobster »

ah tried before - got in this time but forgot how to change my name ... I am bionic64 or something for now

Lobstered
Posts: 2
Joined: Wed Oct 18, 2023 2:44 pm

Re: VeilidGROWL

Post by Lobstered »

Hi Everyone

Lobster here with a new name (Lobstered) had to re-register ... :oops:
Anyway here is VeilidGrowl v0.9 - not sure if it will still work on Bionic
but I finished writing the code
before v1.0 is released mainly for Fossapup64 9.6

Veilid is a relatively new project and experiment
click on Menu Veilid/Veilid to find out more
- once you have the program running :idea:

To run, use the info in the first post in this thread
AND add the enclosed graphic attachment in the same directory.

:geek: Hope it works OK for you - let me know. :thumbup2:

You will notice new security links (some old ones). New federated forum links to firefish - similar to Mastodon :mrgreen:

Code: Select all

#! /bin/bash
 #
 # VeilidGrowl v0.9 
 # Give Receive Open Welcome Learn for Veilid
 # Wed 18 Oct 14:24:42 BST 2023
 # Change Quick FAQ
 # GROWL name changed to 'VeilidGrowl'
 # added Veilid Menu
 # added Firefox and PrivacyBadger options
 # 2 new high quality search engines added under Services
 #    SearXNG and Whoogle
 # changed to urxvt terminal from rxvt

 #### Code begins here
 #### SFR Password Generator
 PASSGEN ()
 {
    # Generates a password with at least:
    # - 1 lowercase letter
    # - 1 uppercase letter
    # - 1 digit
    # - 1 punctuation mark

    TITLE="PassGen"

    # Min: 8, Max:256, Default: 16
    LENGTH=$(Xdialog --stdout --title "${TITLE}" --spinbox "Password length:" 0 0 8 256 16 "")
    [ $? -ne 0 ] && exit

    [ ${LENGTH} -lt 4 ] && LENGTH=4   # must be at least 4, or else the loop below will never end

    while true; do
       while true; do
          PASS="$(tr -cd '[[:alnum:]][[:punct:]]' < /dev/urandom 2>/dev/null | head -c ${LENGTH})"
          if [ -z "${PASS##*[[:lower:]]*}" -a -z "${PASS##*[[:upper:]]*}" -a -z "${PASS##*[[:digit:]]*}" -a -z "${PASS##*[[:punct:]]*}" ]; then
             break   # all criteria were met, so break the loop
          fi
       done

       echo "${PASS}" | Xdialog --title "${TITLE}" --ok-label="Repeat" --cancel-label="Close" --textbox - 0 0
       [ $? -ne 0 ] && break
    done
 }

 export -f PASSGEN

 #### Program 'Grrr' using GtkDialogue begins below

 export Grrr='
 <window title="Veilid" window-position="1">
 <vbox>
 <menubar>
 <menu>

 <menuitem>
 <label>Quick DISCONNECT eth0</label>
 <action>ifconfig eth0 down &</action>
 </menuitem>

 <menuitem>
 <label>Connect eth0</label>
 <action>ifconfig eth0 up &</action>
 </menuitem>

 <menuitem>
 <label>Veilid</label>
 <action>defaultbrowser https://veilid.com/ &</action>
 </menuitem>

 <menuitem>
 <label>Install Firefox</label>
 <action>`Xdialog --wrap --screencenter --left --title "Firefox Browser" --msgbox "Install Firefox\nfrom Quickpet/Browsers\n\nFirefox is not Chrome/Google controlled" 600x0`</action>
 <action>defaultbrowser https://wiki.debian.org/Firefox &</action>
 </menuitem>

 <menuitem>
  <label>Install PrivacyBadger</label>
 <action>`Xdialog --wrap --screencenter --left --title "PrivacyBadger for firefox" --msgbox "Install PrivacyBadger\nfrom Quickpet/Browsers\n\nPrivacyBadger blocks trackers " 600x0`</action>
  <action>defaultbrowser  https://packages.debian.org/buster/webext-privacy-badger &</action>
 </menuitem>

<menuitem>
<label>Discord</label>
<action>defaultbrowser https://discord.com/login/ &</action>
</menuitem>

<menuitem>
<label>Protonmail</label>
<action>defaultbrowser https://protonmail.com/ &</action>
</menuitem>

  <menuitem>
<label>Signal</label>
<action>defaultbrowser https://signal.com/ &</action>
</menuitem>

 <menuitem>
 <label>Run Browser Privately</label>
 <action>rxvt -e defaultbrowser -privately &</action>
 </menuitem>

 <menuitem>
 <label>Edit source code</label>
 <action>geany VeilidGrowl0.9.sh &</action>
 </menuitem>

 <menuitem stock="gtk-quit">
 <action>echo You selected the quit menu item</action>
 <action type="exit">exit by menu</action>
 </menuitem>

 <label>Veilid</label>
 </menu>

 <menu>

 <menuitem>
<label>Fedi.social</label>
<action>defaultbrowser https://fedia.social/ &</action>
</menuitem>

 <menuitem>
 <label>Firefish.social</label>
<action>defaultbrowser https://firefish.social/ &</action>
</menuitem>

  <menuitem>
 <label>infosec.town</label>
<action>defaultbrowser https://infosec.town/ &</action>
</menuitem>

    <menuitem>
 <label>firefish.city</label>
<action>defaultbrowser https://firefish.city/ &</action>
</menuitem>

  <label>Federation</label>
 </menu>

 <menu>

 <menuitem>
 <label>Htop process viewer</label>
 <action>rxvt -e htop &</action>
 </menuitem>

 <menuitem>
 <label>Cover Your Tracks (EFF)</label>
 <action>defaultbrowser https://coveryourtracks.eff.org/ &</action>
 </menuitem>

 <menuitem>
 <label>Ipinfodb</label>
 <action>defaultbrowser ipinfodb.com &</action>
 </menuitem>

 <menuitem>
 <label>Webkay</label>
 <action>defaultbrowser webkay.robinlinus.com &</action>
 </menuitem>

 <menuitem>
 <label>Shields Up</label>
 <action>defaultbrowser https://www.grc.com/x/ne.dll?bh0bkyd2 &</action>
 </menuitem>

 <menuitem>
 <label>DNS leak test</label>
 <action>defaultbrowser https://www.dnsleaktest.com &</action>
 </menuitem>

 <menuitem>
 <label>Ipleak</label>
 <action>defaultbrowser https://ipleak.net/ &</action>
 </menuitem>

 <label>Probes</label>
 </menu>

 <menu>

 <menuitem>
 <label>Ecosia Search</label>
 <action>defaultbrowser https://www.ecosia.org/ &</action>
 </menuitem>

<menuitem>
 <label>SearXNG Search</label>
 <action>defaultbrowser https://searx.space/ &</action>
</menuitem>

<menuitem>
 <label>Whoogle Search</label>
 <action>defaultbrowser https://whoogle.io/ &</action>
</menuitem>

 <menuitem>
 <label>Password Generator</label>
 <action>PASSGEN &</action>
 </menuitem>

 <menuitem>
 <label>Anonymouse proxy</label>
 <action>defaultbrowser anonymouse.org &</action>
 </menuitem>

  <menuitem>
 <label>Vpnbook proxy</label>
 <action>defaultbrowser http://www.vpnbook.com/webproxy &</action>
 </menuitem>

 <menuitem>
 <label>HideMe Proxy</label>
 <action>defaultbrowser https://hide.me/en/proxy &</action>
 </menuitem>

 <label>Services</label>
 </menu>


 <menu>

 <menuitem>
 <label>About Flash Cookies</label>
 <action>defaultbrowser http://www.murga-linux.com/puppy/viewtopic.php?p=340237#340237 &</action>
 </menuitem>

 <menuitem>
 <label>Browser Security Add Ons</label>
 <action>defaultbrowser https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ &</action>
 </menuitem>

 <menuitem>
 <label>Honeynet Open Security info</label>
 <action>defaultbrowser http://www.honeynet.org/about &</action>
 </menuitem>

 <menuitem>
 <label>Surveillance Self-Defense (EFF)</label>
 <action>defaultbrowser  https://ssd.eff.org/ &</action>
 </menuitem>

 <menuitem>
 <label>CIA Hacking info</label>
 <action>defaultbrowser https://wikileaks.org/ciav7p1/cms/index.html &</action>
 </menuitem>

 <menuitem>
 <label>Unconventional Security info</label>
 <action>defaultbrowser https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html &</action>
 </menuitem>

 <menuitem>
 <label>NCSC UK security guidance</label>
 <action>defaultbrowser https://www.ncsc.gov.uk/guidance &</action>
 </menuitem>

 <menuitem>
 <label>EUFI Secure boot</label>
 <action>defaultbrowser http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot &</action>
 </menuitem>

  <menuitem>
 <label>GtkDialog tutorial</label>
 <action>defaultbrowser https://wikka.puppylinux.com/gtkdialog &</action>
 </menuitem>

 <menuitem>
 <label>Build a tin hat</label>
 <action>defaultbrowser http://zapatopi.net/afdb/ &</action>
 </menuitem>

 <menuitem>
 <label>Credits</label>
 <action>`Xdialog --wrap --screencenter --left --title "About" --msgbox "VeilidGrowl v 0.9\nOctober 023\nUpdated by Lobster. Password Generator Code by SFR" 600x0`</action>
 </menuitem>

 <label>Help</label>
 </menu>

 </menubar>
 <frame>
  <pixmap>
 <input file>r2.png</input>
 </pixmap>
 <text><label>VeilidGrowl 0.9</label></text>
 </frame>
 <hbox>
 <button help>
 <action>`Xdialog --wrap --screencenter --left --title "'$(gettext 'VeilidGrowl - Quick Start Help')'" --msgbox "'$(gettext ' VeilidGrowl v0.9 is a simple, open, configurable, Security Tool \n\n Written in bashscript using the GtkDialog4 container on Puppy Linux and the Geany text environment \n\n Veilid is used for enhancing security, education, online services and probing ones set up \n\n Lobster, Wed 18 Oct 14:24:42 BST 2023')'" 600x0`</action>
 </button>
 <button cancel></button>
 </hbox>
 </vbox>
 </window>'

 gtkdialog4 --program Grrr
 unset Grrr
Attachments
r2.png
r2.png (3.62 KiB) Viewed 625 times
User avatar
rockedge
Site Admin
Posts: 5825
Joined: Mon Dec 02, 2019 1:38 am
Location: Connecticut,U.S.A.
Has thanked: 2078 times
Been thanked: 2174 times
Contact:

Re: VeilidGROWL

Post by rockedge »

Lobstered wrote: Wed Oct 18, 2023 4:09 pm

Lobster here with a new name (Lobstered) had to re-register ... :oops:

What happened? I can set a new password or change the email address for you if you want to return to Lobster. I can merge the new topics into Lobster as the author if needed.

Wouldn't be the same without Lobster patrolling the ocean floor

Post Reply

Return to “Programming”